Skip to search formSkip to main contentSkip to account menu

Key (cryptography)

Known as: Encryption key, Cryptographic key, Key (cryptology) 
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm. For encryption… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2011
Review
2011
In wavelength-switched optical networks (WSONs), quality of transmission (QoT) has to be guaranteed during lightpath provisioning… 
Highly Cited
2006
Highly Cited
2006
The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. However, a main… 
Highly Cited
2003
Highly Cited
2003
We demonstrate error-free dense-wavelength-division multiplexing (DWDM) transmission of 40 40-Gb/s channels with 100-GHz spacing… 
Highly Cited
1996
Highly Cited
1996
A spread spectrum system to counter bandlimited Gaussian interference is proposed. The optimum receiver for this system is easy… 
Highly Cited
1989
Highly Cited
1989
The authors apply a general method of bounding the event error probability of TCM (trellis-coded modulation) schemes to fading… 
Highly Cited
1989
Highly Cited
1989
Consideration is given to the problems related to the design of M-ary continuous-phase frequency-shift keying (CPFSK) systems… 
Highly Cited
1988
Highly Cited
1988
The authors demonstrate a trellis coded modulation technique referred to as multiple trellis coded modulation (MTCM) wherein more… 
Highly Cited
1988
Highly Cited
1988
Differential detector structures that use decision feedback to partially remove the effect of destructive intersymbol… 
Highly Cited
1984
Highly Cited
1984
Minimum shift keying with Gaussian shaped transmit pulses is a strong candidate for a modulation technique that satisfies the…